The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since the late 1990s, studies of team performance management have experienced a great growth over a decade. Researchers study on this field from several different aspects and subjects. Reviewing these years' hot domains and research trends of team performance management, it's clear that the study from the very beginning have a comprehensive, intercrossing and complicated feature. Taking use of co-citation...
In many applications it is necessary to be able to classify images in a database accurately and with acceptable speed. The main problem is to assign different images to right categories. The later problem becomes more challenging while dealing with large databases with many categories and subcategories. In this paper we propose a novel classification method based on an adopted hierarchical Dirichlet...
Researched and developed the software system of Information Management and Decision Support System of the hidden danger troubleshooting of Coal Mine. By using the technology of collaborative software to realize fast circulation of information, dynamic tracking, rapid feedback, and closed-loop management of transaction processing for the hidden danger, and by applying the technology of data mining,...
In this paper, we used X-Means clustering algorithm, incorporated data images from a so-called Iterative Data Image Rotated Bar Graph (iDIRBrG) method (formerly referred as BC method) and used Vector Fusion Visualization to achieve better traffic data analysis results compared to our previous work by improving how data signatures are constructed from the raw data set. By doing so, we effectively identify...
Given a dataset comprising a temporal sequence of communications between actors, how can we visualize the `flow' of communication over time? Current practice transforms the dataset into a dynamic graph - vertices represent the actors and directed edges represent the communications. The directed edges are added and removed over time. There are then several approaches to visualizing dynamic graphs that...
Pixel-value-differencing (PVD) based steganographic methods, which take into account the characteristic of human visual system, usually lead to large embedding capacity and good visual imperceptibility. In this paper, a recently proposed PVD-based steganography is further studied. First, by deriving a sufficient condition for data embedding/extraction, we show that the method can be generalized, and...
The bit-plane complexity segmentation (BPCS) steganography has good visual imperceptibility and high data embedding capacity, but the original BPCS method is vulnerable to the statistical analysis of complexity histogram. A modified BPCS method was proposed to enhance the security, but the deficiency still exists. Basing on the analysis of the original and modified BPCS method, an improved BPCS algorithm...
Previous proposed steganographic schemes based on tolerable error range (TER) can restrict the distortion caused by data hiding within an acceptable range, but both the stego-image and the original image are necessary for extracting the secret message. This paper presents a novel TER-based steganographic scheme, in which JPEG compression under a certain quality factor is regarded as TER, and the modification...
Web applications suffer from software and configuration faults that lower their availability. Recovering from failure is dominated by the time interval between when these faults appear and when they are detected by site operators. We introduce a set of tools that augment the ability of operators to perceive the presence of failure: an automatic anomaly detector scours HTTP access logs to find changes...
With the increase of economic globalization and evolution of information technology, financial data are being generated and accumulated at an unprecedented pace. As a result, there has been a critical need for automated approaches to effective and efficient utilization of massive amount of financial data to support companies and individuals in strategic planning and investment decision-making. Data...
The motivation for this research stemmed from a desire to create visual aids to help researchers/managers interpret ensembles of decision tree outputs generated by various algorithms. The method employed a simulation experiment (using only bagging) followed by application of the new visualization tools on actual survey data. Simulated data, with a prespecified structure, were "bagged" with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.